Kurtis Lindqvist wrote:
>>
>> What is interesting is that people can identify a EUI-64 unicast
>> address no matter where you are. For example, i use my laptop at work
>> and at home (assuming I had an ipv6 connection at home). I could be
>> identified as the same computer, without using cookies
> What is interesting is that people can identify a EUI-64 unicast
> address no matter where you are. For example, i use my laptop at work
> and at home (assuming I had an ipv6 connection at home). I could be
> identified as the same computer, without using cookies, since my base
> 64 address wo
> > How can I recognize someone by doing a portscan?
>
> http://www.insecure.org/nmap
>
> It slices, it dices, it makes julienne fries.
>
> (I'm assuming you mean in the same sense as "you can identify a machine's
> vendor based on the EUI-64..." - neither a portscan or a MAC address will
> tell
On Tuesday, August 27, 2002, at 05:33 PM, Iljitsch van Beijnum wrote:
>
> On Tue, 27 Aug 2002, Kurtis Lindqvist wrote:
>
>>> fears abuse as a hardware ID wired into the ipv6 protocol
>>> can
>>> be used to determine the manufacturer, make and model number, and
>>> value
>>> of the hardware
> > You can tell as much (more or less) with a port scan to a IPv4
> > address...
>
> How can I recognize someone by doing a portscan?
Not the person, but the system type.
- kurtis -
On Tue, 27 Aug 2002 17:48:24 EDT, [EMAIL PROTECTED] said:
> (I'm assuming you mean in the same sense as "you can identify a machine's
> vendor based on the EUI-64..." - neither a portscan or a MAC address will
> tell you who's machine it is, as far as I know (although doing an nmap to find
> port
On Tue, 27 Aug 2002 23:33:40 +0200, Iljitsch van Beijnum said:
> How can I recognize someone by doing a portscan?
http://www.insecure.org/nmap
It slices, it dices, it makes julienne fries.
(I'm assuming you mean in the same sense as "you can identify a machine's
vendor based on the EUI-64..." -
On Tuesday, August 27, 2002, at 05:07 PM, Marshall Eubanks wrote:
> On Tue, 27 Aug 2002 14:43:38 -0400
> Peter John Hill <[EMAIL PROTECTED]> wrote:
>>
>>
>> On Tuesday, August 27, 2002, at 10:41 AM, Joe Baptista wrote:
>>
>> Since it so easy for a host (relative to ipv4) to have multiple ip
On Tue, 27 Aug 2002, Kurtis Lindqvist wrote:
> > fears abuse as a hardware ID wired into the ipv6 protocol can
> > be used to determine the manufacturer, make and model number, and value
> > of the hardware equipment being used by the end user.
> ...uhm, and? What is the real difference with a
On Tue, 27 Aug 2002, Marshall Eubanks wrote:
> > Since it so easy for a host (relative to ipv4) to have multiple ip
> > addresses, I like what Microsoft has done. If told by a router, a Win
> > XP box will assign itself a global unicast address using EUI-64. It
> > will also create a global unic
> However IPv6 has many privacy issues. IPv6 address space uses an ID
> (indentifier) derived from your hardware or phone. "That allows your
> packets to be traced back to your PC or cell-phone" said .
> fears abuse as a hardware ID wired into the ipv6 protocol can
> be used to determine the
On Tue, 27 Aug 2002 14:43:38 -0400
Peter John Hill <[EMAIL PROTECTED]> wrote:
>
>
> On Tuesday, August 27, 2002, at 10:41 AM, Joe Baptista wrote:
>
> > Ipv6 uses 128 bits to provide addressing, routing and identification
> > information on a computer. The 128-bits are divided into the left-6
On Tuesday, August 27, 2002, at 10:41 AM, Joe Baptista wrote:
> Ipv6 uses 128 bits to provide addressing, routing and identification
> information on a computer. The 128-bits are divided into the left-64
> and
> the right-64. Ipv6 uses the right 64 bits to store an IEEE defined
> global
> i
Kevin Oberman wrote:
> Yes, Windows. Today. Now. But you must explicitly enable it at this
> time.
>
The one that ships with Win XP is quite seriously broken in it's
resolver behaviour (you'll not be able to reach many IPv4 WWW
sites after enabling it) and additionally none of the Windows
serv
>>> "Kevin" == Kevin Oberman <[EMAIL PROTECTED]> writes:
Kevin> This is really pretty silly.
Not really, Joe may actually have a point here.
Kevin> Only end nodes will auto-configure with the MAC address
Kevin> used for 48 bits of the IPv6 address. Exactly how this is a
> Date: Tue, 27 Aug 2002 10:41:08 -0400 (EDT)
> From: Joe Baptista <[EMAIL PROTECTED]>
> Sender: [EMAIL PROTECTED]
>
>
>
> Hi:
>
> I'm doing an article on IPv6 and am looking for comments - here is a
> portion on IPv6 which relates to the privacy issue ... any comments,
> crtics or interviews
> From: "John Palmer" <[EMAIL PROTECTED]>
> Date: Tue, 27 Aug 2002 09:52:01 -0500
> Sender: [EMAIL PROTECTED]
>
>
>
> - Original Message -
> From: "Joe Baptista" <[EMAIL PROTECTED]>
> To: <[EMAIL PROTECTED]>
> Sent
Joe,
> Ipv6 uses 128 bits to provide addressing, routing and identification
> information on a computer. The 128-bits are divided into the left-64 and
> the right-64. Ipv6 uses the right 64 bits to store an IEEE defined global
> identifier (EUI64). This identifier is composed of company id valu
- Original Message -
From: "Joe Baptista" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Tuesday, August 27, 2002 09:41
Subject: IPv6 Interview Questions and critic
>
>
> Hi:
>
> I'm doing an article on IPv6 and am looking for comments - he
ooh how exciting, you can tell who uses 3Com network cards :)
Most networks eg P2P will use /127 and not use MAC anyway so I cant see this
being a privacy on issue on anything but end devices and you can override if yuo
feel the need...
On end devices by default yes it uses mac, I cant see wh
Hi:
I'm doing an article on IPv6 and am looking for comments - here is a
portion on IPv6 which relates to the privacy issue ... any comments,
crtics or interviews welcomed.
-- snip
As you know IPv6 is a suite of protocols for the network layer of the
Internet which uses IPv4 gateways. It's pu
21 matches
Mail list logo